608 Midterm
The chain of custody protects against the _____________ of evidence as a result of investigators losing control of it. A. Shredding b. Possible corruption c. Leaking d. Unauthorized distribution
b
A cashier at Pretty Good Shoes, Inc. sold a pair of shoes to a cash paying customer who did not wait for a receipt. Instead of ringing up the sale and placing the cash in the drawer, the cashier rang "no sale" and then pocketed the cash after the customer left. Which type of fraud strategy did the cashier utilize? a. Skimming b. Lapping c. Filching d. Layering
a
A civil action requires a _________________ of the evidence, meaning that the evidence stacks up slightly more heavily on one side than the other. This con- trasts with the criminal threshold of "____________________." A. Preponderance; beyond a reasonable doubt b. Predication; proof-positive c. Probative evaluation; facts at issue d. Proportionality; beyond any reasonable doubt
a
A critical aspect of civil litigation for the forensic accountant and fraud examiner is the understanding that: A. Both sides (plaintiff and defendant) are expected to tell their story b. Both sides (plaintiff and defendant) are expected to present only facts in court c. Both sides (plaintiff and defendant) are expected to countersue each other as a strategy d. Both sides (plaintiff and defendant) are expected to negotiate a settlement
a
A primary purpose of _________________ is to prevent any one person from having too much control over a particular business function. A. Separating duties b. Conducting criminal history checks of employees c. Oversight and supervision d. Antifraud training
a
A workplace search is considered reasonable under two circumstances: The search must be justified at its inception because it is likely to reveal evidence of work-related misconduct, and: A. The search is necessary to further the investigation. b. The search is necessary to satisfy a court order. c. The search is necessary to preserve public order. d. The search is necessary to operational efficiency.
a
According to the ACFE's 2016 Report to the Nations on Occupational Fraud and Abuse, what kind of fraud scheme resulted in the greatest percentage of cases? A. Billing b. Check tampering c. Expense reimbursements d. Skimming
a
An organization's accounting system should be set up to _________________ that are coded as travel and entertainment expense a. Flag duplicate payment amounts b. Require original credit card statements in lieu of receipts for expenses c. . Run an automatic Benford analysis on all expenses (especially on 0's and 5's) d. Closely scrutinize expenses
a
Assets should be removed from operations only with _______________. a. The proper authority b. An internal auditor's approval c. Verification of perpetual inventory d. Proper adjustments to journal entries
a
Basic (accounting) bookkeeping involves the recording, classifying, and summariz- ing of economic events in a logical manner for the purpose of providing accounting, fi- nancial, and _____________ information for decision making. A. Nonfinancial B. Factual C. Investment D. Complex
a
Billing schemes generally fall into one of three categories: shell company schemes, nonaccomplice vendor schemes, and _______________. A. Personal purchases schemes b. Check writing schemes c. Skimming schemes d. False documentation schemes
a
Evidence may be testimonial, real or demonstrative, or ______________. A. Circumstantial or direct b. Probative in value c. Expert opinion-based (if admissible) d. Sealed under the Foreign Intelligence Act of 1978
a
For a ghost employee scheme to work, four things must happen: (1) the ghost must be added to the payroll, (2) timekeeping and wage rate information must be collected and submitted for processing, (3) a paycheck must be issued to the ghost, and (4): A. The check must be delivered to the perpetrator or accomplice. b. Income tax withholding must be filed in the name of the ghost. c. An accomplice of the fraudster must cash the check. d. At least three after-hours specter sitings on company property must have been independently reported in the previous pay period
a
Forensic accounting is the application of financial principles and theories to facts or hypotheses in a legal dispute and consists of two primary functions: A. Litigation advisory services and investigative services b. Expressing an opinion of guilt or innocence in court regarding audit results and documenting the steps taken to reach that opinion c. Subjecting accounting data to a Benford Analysis and explaining the results to a judge or jury d. Providing courtroom testimony and administrative technical guidance to attorneys
a
If a retail cashier perpetrates larceny, there will be an imbalance between the _________ and the ____________. a. Register tape; cash drawer b. Register user log-in/log out records and store hours c. Cash drawer; bank deposit slips d. Register sales; store's inventory
a
In the occupational fraud setting, a cash larceny may be defined as the ____________________ without the consent and against the will of the employer. a. Intentional taking away of an employer's cash b. Theft of more than $1,000 (in either currency or checks) c. Skimming of cash before it hits the company's books d. The theft of more than $10,000 (in either currency or checks)
a
Most successful altered payee schemes occur when the person who prepares checks also has: A. Access to those checks after they have been signed. b. A knowledge of offsetting debits and credits. c. A perceived pressure and a perceived opportunity. d. An unusually close relationship with one or more company vendors
a
One of the most fundamental observations of the Cressey study was the _____________, i.e., that the conditions under which a trust violation occurs necessitate all three elements (of what was later named the fraud triangle). A. Conjuncture of events b. Timing of events c. Circumstances of events d. Sequence of events
a
Perhaps the key to preventing sales skimming is to maintain a _________________ at any point where cash enters an organization. a. Viable oversight presence b. Dispersion of cash registers throughout the store c. Continuous presence of management d. Roster of trustworthy employees
a
Prevention of nonaccomplice vendor invoicing schemes is largely dependent on: A. Purchasing functional controls b. Hiring honest employees c. The competence of internal auditors d. Regular ethics training
a
The most important factor in preventing cash larceny from deposits is ____ a. Separating duties b. To hire honest people c. Entrusting new employees d. Requiring the person who prepares the deposit to also receive and log incoming payments
a
The most important step in preventing credit card fraud is ____________________: A. Conducting thorough review of each credit card statement. b. Requiring users to obtain a purchase order prior to using the card. c. Spot checking receipts for appropriateness. d. Implementing a policy that prohibits users from making personal purchases with company cards
a
There are essentially two ways a person can misappropriate a company asset: the asset can be ____________, or it can be _______________. A. Misused; stolen b. Misclassified in inventory; "borrowed" c. Misstated (on the balance sheet); concealed altogether d. Misdirected to a shell company; deposited in an offshore account
a
When inventory is stolen, the key concealment issue for the fraudster is _________. A. Shrinkage b. Removing the stolen inventory from the premises c. Trust d. Physical access (to secure areas)
a
When organization bank statements are reconciled, double endorsements on checks should always raise suspicions, particularly when the second signer is ______________. A. An employee of the organization b. A relative of a vendor company key employee c. A signature stamp or an automated signature d. A ghost employee
a
Which of the following represents the three main categories of payroll fraud? A. Ghost employee schemes, falsified hours and salaries schemes, commission schemes. b. Forged maker schemes, forged endorsement schemes, and personal expense schemes. c. The act, concealment and conversion d. Check tampering, erasable ink, and intercepted check schemes
a
Within the context of concealing larceny, adjusting customer accounts with unauthorized "courtesy discounts" is an example of _____________. a. Reversing entries b. Destruction of records c. Force balancing d. Shrinkage
a
_____________ inventory and other assets is a relatively common way for fraudsters to remove assets from the books before or after they are stolen. A. Writing off b. Fictitious sales of c. Simply walking off with d. False shipments of
a
(76) Individual rights are grounded in four amendments to the US Constitution associated with due process. Which of the following is not one of these four amendments? a. The Fourth Amendment prohibits unreasonable searches and seizures b. The Seventh Amendment which entitles the accused the right to a speedy trial c. The Fourteenth Amendment entitles a person to due process of law and equal pro-tections under the law d. The Fifth Amendment provides that a person cannot be compelled to provide incriminating information against himself in a criminal case
b
A fiduciary is someone who: a. Swears an oath before taking office b. Acts for the benefit of another c. Betrays the trust of another d. Controls access to an organization's cash or assets
b
A significant increase in ___________ could indicate an inventory theft scheme. a. Warehouse employee turnover B. Scrap levels c. Changing usual vendors d. Perpetual inventory
b
Cressey observed that rationalization as it applies to occupational fraud occurs _________________ the crime. A. After b. Before c. While d. Seldom
b
Fraudulent cash register disbursement schemes differ from cash register skimming and larceny in that when the money is taken from the cash register: a. it is always a collusive act involving an employee and an accomplice b. it is recorded on the register tape c. it results in a credit to inventory because the merchandise was not actually returned d. it leaves the victim company's books in balance
b
If the accounting duties associated with accounts receivable are properly __________ so that there are independent checks of all transactions, skimming payments is very difficult to commit and very easy to detect. A. Regulated b. Separated c. Ordered d. Documented
b
In a ____________________, the perpetrator uses false documentation—such as an invoice, purchase order, or credit card bill—to cause his employer to issue payment for some fraudulent purpose. A. False documentation scheme b. Billing scheme c. Skimming scheme d. Corruption scheme
b
James Dunham was the CEO at a small non-profit ministry dependent on donor contributions that sent medical doctors and supplies to Haiti. The name of the non-profit was "Limye Medical Missions" (Limye means light in Haitian Creole). Eventually, the board received a tip from an employee that James had been stealing money from the organization. The investigation revealed that the way James did this was to direct his office staff to place the mail unopened on his desk each day. When James returned from lunch, he entered his office and locked his door and sorted the mail. He placed contributions into two stacks. One stack contained only checks that were made payable to Limye Medical Missions. These were deposited in the ministry's bank account. The other stack contained checks made payable simply to, "Limye." To these checks, James simply added the words "and Friends, Inc" on the payee line. The latter were then deposited by James into a shell company bank account called Limye and Friends. The type of check tampering scheme used by James is known as a ___________ scheme: A. Fraudulent payee b. Tacking on c. Payments diversion d. Forged endorsement
b
Jed is an accounts payable clerk for a mid-sized office supply company. Although he has access to check stock, he is not a signer. One day he decided to "borrow" some company money to cover some past-due personal bills by forging his boss's signature on a company check. One of Jed's biggest challenges will likely be: A. Facing prosecution if he gets caught. b. Concealing the forged check from the company. c. Producing a reasonable facsimile of his boss's signature. d. Whether to make the check payable to himself or his wife (using her maiden name).
b
Known as "off-book" frauds, skimming schemes involve the theft of cash before it is recorded in the victim company's books. As a result, __________________________. A. Such schemes are typically used by corrupt CEOs/CFOs b. It may be difficult to detect that money has been stolen c. SOX standards impose stricter penalties on skimmers d. Salespeople, tellers, and wait staff are obviously not the most likely candidates to skim funds because they need their jobs
b
Most cash larceny schemes only succeed because of a lack of ____________. A. Qualified people b. Internal controls c. Training d. Trust (in the organization)
b
One common red flag useful in detecting fraudulent invoices is. A. The often poor printing/formatting quality used b. A lack of detail c. A disproportionate cost relative to the services rendered d. An unanticipated/inexplicable vendor discount
b
Regardless of how hiring of new employees is handled within a business, it is ___________________ that are in the best position to put ghosts on the payroll. A. The CEO and CFO b. The person or persons with authority to add new employees c. Perpetrators of occupational fraud d. Supervisors
b
Sally was a secretary/assistant bookkeeper at a local non-profit food pantry. Part of her duties included opening mail, processing invoices, and authorizing payments. She used her position to intentionally pay some bills twice, then requested that recipients return one of the checks which she then intercepted and subsequently deposited into her own bank account. Sally's scheme is known as a: a. Double-bill and intercept scheme b. Pay-and-return scheme c. Pass-through scheme d. Forged maker scheme
b
The triangle of fraud action is sometimes referred to as ____ a. the fraud triangle b. the elements of fraud c. the fraud diamond d. Crowe's fraud pentagon
b
There are a number of red flags that may indicate an employee is seeking reimbursement for fictitious travel and entertainment expenses. One of the most common is the employee who claims items—particularly high dollar items—were paid for _________: A. Without obtaining a receipt b. In cash c. Purportedly for business but are actually personal d. With another employee's P-card
b
Whereas skimming schemes involve the theft of ___________, cash larceny schemes involve the theft of money ___________. A. Checks only; and checks b. Off-book funds; that has already appeared on a victim company's books c. Cash at the point of sale; during the bookkeeping process d. Company assets; with criminal intent
b
Within the context of concealing larceny, making unsupported entries in the company's books to produce a fictitious balance between receipts and the ledger is an example of: a. destruction of records b. force balancing c. lapping d. reversing entries
b
An audit is performed to ensure that ___________________________________. A. Reasonable assurance of SOX compliance can be attained by holders of a com- pany's stock. b. The organization is complying with PCAOB, FASB, and AICPA accounting stan- dards. c. The financial statements are fairly presented and are free from material misstate- ment. d. Financial fraud is not occurring within the organization.
c
As the bookkeeper for Somewhat Healthy Foods, Inc., Ted stole $250,000 over four years (using an intricate lapping scheme). In cases such as this, it is common for the perpetrator to have developed a reputation as a/an ________________. A. Substandard employee because they have a bad attitude and are disliked by co- workers b. Average employee because they do what they're supposed to do, but will not go the extra mile or put in overtime if needed c. Model employee because they put in a lot of overtime and rarely take vacations d. Dangerous individual because they often threaten people around them
c
Dr. Steve Albrecht substituted _______________ for rationalization in the development of the "Fraud Scale." A. Emotional distress b. Greed c. Personal integrity d. Sociopathic tendencies
c
Given that occupational fraudsters do not have distinguishing outward characteristics to identify them as such, the most effective way to catch a fraudster is to: A. Set aside professional skepticism b. Rely on your own value system c. Think like one d. Accept evidence without being critical of it
c
In 2010, Jonathan Marks argued for the role of _____________ in fraud. A. Age b. Myers-Briggs Personality Types c. Arrogance (or lack of conscience) d. Garden variety greed
c
In general, noncash misappropriations fall into one of the following categories: misuse, unconcealed larceny, asset requisitions and transfers, purchasing and receiving schemes, and _______________. A. Vendor fraud b. Deposit larceny c. fraudulent shipments d. bribery and corruption
c
Internal fraud committed by one or more employees of an organization is more commonly referred to as: a. Fiduciary breach and embezzlement b. Insider trading and market timing c. Occupational fraud and abuse d. Check tampering and billing schemes
c
Many times, shell companies schemes involve the purchase of services rather than goods such as "consulting services." Why is this? A. Because services have no fixed market price, it is harder to compare value. b. Because services are often authorized by organizational management, no one questions them. c. Because services are not tangible, it is more difficult to confirm or deny their receipt. d. Because services are non-durable, it is more difficult to capitalize them.
c
Not all cash larceny schemes occur at the point of sale. Larceny of receivables is generally concealed through one of three methods: force balancing, reversing entries and _____________. A. Thefts from other registers b. Skimming c. Destruction of records d. Appearing to be a model employee
c
One basic fraud detection approach is to run a computer query that compares ________________________ to the ___________________ in the accounts payable system. A. Names of vendors; shell company invoices b. Invoices; purchase orders c. Employees' home addresses; addresses of vendors d. Employee names; payment authorizers
c
One of the simplest methods for concealing shrinkage is to change the ___________ inventory record so that it matches the ____________ inventory count. A. Warehouse; sales floor b. Digital; manual c. Perpetual; physical d. Inspection of the random
c
Significant research suggests that increasing _______________ may be the best way to deter employee theft. A. The threat of punishment by the employer b. The presence of internal security c. The perception of detection d. The frequency of fraud prevention education
c
Skimming receivables requires _________ than skimming sales. A. Less risk of detection b. More opportunity c. More effort d. Less effort
c
The most basic way an employee accomplishes an authorized maker scheme is to: A. Have authority to approve purchases as well as maintain the general ledger. b. Forge the signature of an authorized signer. c. Override controls designed to prevent fraud d. appear to be a model employee
c
The overriding rule regarding searches and search warrants is that individuals have: A. A right to not self-incriminate b. An expectation of absolute privacy within their home or vehicle c. A reasonable expectation of privacy d. A right to privacy in the workplace (such as lockers, desks, etc.)
c
There are essentially three tools available to fraud examiners, regardless of the nature of the fraud examination or forensic accounting investigation. Which of the following is NOT one of these three tools? a. Skill in examining financial statement, books and records, and supporting documents b. Interviewing skills c. Preserving a crime scene from contamination d. Observation (behavior, displays of wealth, specific offenses)
c
Unfair pricing, unfair business practices, violation of the FCPA and tax evasion are examples of: A. Ordinary corporate behavior b. Occupational fraud and abuse c. Organizational crime d. More of a problem nationally than internationally
c
Using the fraud theory approach to investigate a case, which step should be your first in an investigation? A. Create hypotheses b. Draw conclusions c. Gather related data/evidence d. Identify a specific law or laws that may have been broken
c
Which of the following is an example of financial statement and reporting fraud? a. Failing to post audit results on the company's website b. Debt ratio is materially higher than industry standards c. Improper timing of revenue and expense recognition d. Net income for any quarterly filing is 17% or more below analyst predictions
c
While inventory shrinkage may be a red flag that fraud is occurring, it is not _______________. A. An indicator with which management should be overly concerned b. A reliable indicator of anything other than normal business fluctuations c. An unambiguous signal d. An anomaly
c
Who said, "White collar criminals consider your humanity as a weakness to be exploited ..."? a. Dr. Joseph T. Wells b. Sherron Watkins c. Sam E. Antar d. Andrew Fastow
c
You are a fraud examiner or forensic accountant that is about to conclude an investigation. You have gathered evidence that will allow you to compellingly connect the who, what, when, where, and why dots in court. You are also reasonably certain there is additional evidence that will support your conclusions, but you have been unable to find any. In the world of fraud investigations, moving forward without such evidence is: A. Not ethical b. Not lawful c. Not unusual d. Not in conformity with ACFE investigative standards
c
____________ is the process by which each side may explore the merits of the other side's arguments by obtaining documentary and testimonial evidence. A. No lo contendere b Crossexamination c. Discovery d. cease and desist
c
most noncash larceny schemes are not very ___ a. logical b. easy to perpetrate c. complicated d. easy to prevent/detect
c
29.3% of respondents to the 2016 ACFE survey cited a lack of ________ as the victim organizations' primary issue that contributed to the fraudster's ability to perpetrate the scheme. A. Management review b. Amoral corporate culture c. Employee fraud education d. Internal controls
d
A large percentage of cash larceny schemes occur at the point of sale because ______________. A. Skimming, by comparison, is much more difficult b. It is easy to conceal c. Low level employees are typically less honest than management d. That's where the money is
d
A scheme whereby an employee intercepts a company check intended for a third party and converts the check by signing the third party's name on the endorsement line is known as a ________________ fraud. A. False purchase requisition b. Pay-and-return c. Intercept and conversion d. Forged endorsement
d
Dr. Rudding was superintendent of a charter school. Because of his responsibilities, the school issued a credit card to him to use when making certain kinds of purchases (such as travel expenses while on school business). Over time, Dr. Rudding perceived that no one on his board was reviewing the credit card statements, nor was he questioned by anyone in the business department, so he began using the card to fill up his own car, buy coffee on the way to work, and take his wife out to fine dining restaurants. The kind of fraud that Dr. Rudding committed is known as a: A. Pay-and-return scheme. b. Pass-through scheme. c. Shell company scheme. d. Personal purchasing scheme
d
In almost all successful altered payee schemes, the perpetrator was able to prepare checks and __________________. A. Approve invoices for payment b. Forge the maker's signature reasonably well c. Cash them at a local bank without any suspicions d. Reconcile the bank statement
d
In an audit or investigation, the antifraud professional must design _____________ to identify anomalies, investigate those anomalies, form and test hypotheses, and evaluate the evidence generated. A. Statistical models b. Algorithms c. A spreadsheet with conditionally formatted cells d. Procedures
d
In point of sale cash larceny schemes, several methods are used by fraudsters to conceal their thievery. These include thefts from other registers, death by a thousand cuts, reversing transactions, altering cash counts or register tapes, and _________________. a. Padding the perpetual inventory b. Volunteering to work overtime and rarely taking vacations c. Appearing to be a model employee d. Destroying register tapes
d
In preventing and detecting overstated expense reimbursement schemes, it is particularly important that the organization require: A. Employees to submit itineraries or travel agency receipts b. Employees to report their expenses accurately c. Copies of credit card statements d. Original receipts for all expense reimbursements
d
In the purchasing function, it is important to separate the duties of requesting (requisitioning) goods, ordering goods, receiving goods, maintaining perpetual inventory records, and _______________. a. Verifying of physical (against the perpetual) inventory b. Executing purchasing c. Spot checking supporting documents D. Issuing payments
d
One of the most common breakdowns of internal controls in forged endorsement fraud is: A. "Rubber stamp"/inattentive supervisors that sign checks without proper scrutiny. b. Making checks payable to "cash." c. Failing to secure blank check stock under lock and key. d. Returning the signed check to the employee that prepared it.
d
One simple measure that makes it easy to detect off-hours sales is to compare the organization's hours of operation to cash register _________________. A. Same store daily average sales totals b. Voided transaction totals c. Beginning/ending cash in the drawer compared to daily deposit slips D. User log-in/log-out time records
d
The Sarbanes-Oxley Act of 2002 was signed into law to address corporate gover- nance and accountability as well as public accounting responsibilities in improving the quality, reliability, integrity, and transparency of financial reports. Which of the following is NOT one of the measures the law aimed to accomplish? A. Establishing higher standards for corporate governance and accountability b. Creating an independent regulatory framework for the accounting profession c. Establishing new protections for corporate whistleblowers d. Diminishing fraud, waste and abuse among 501(c)(3) tax-exempt charities
d
The fundamental purpose of the COSO ERM framework approach is to help entities ensure that they will be able to achieve their operational financial objectives and goals. Which of the following are NOT included in the framework? a. Achieving high-level strategic goals and the entity's mission b. Effective and efficient use of the company's operational resources c. Safeguarding of company resources by preventing loss through fraud, theft, waste, inefficiency, bad business decisions, etc. d. Whether realistic organizational goals and objectives are set
d
The legal standard for the tort of negligence does NOT include the following element: A. Damages b. Duty c. Cause in Fact d. Intent
d
The triangle of fraud action is composed of which three elements: a. Incentive, opportunity, rationalization b. Surveillance, invigilation, documentation c. Devise a scheme, execute it, launder the proceeds d. Act, concealment, conversion
d
Those with the authority to approve purchases would be among the most likely to engage in ___________ since they have fewer hurdles to overcome than other employees. A. Personal purchases schemes b. Skimming schemes c. False documentation schemes d. billing schemes
d
You have been hired by the owner/CEO of Tread Lightly Tires, a family held private company in the automotive tire business, to investigate whether a back office receivables clerk has been skimming customer payments. Which of the following, if it exists, will greatly aid in your investigation? A. Accurate inventory records b. Surveillance footage from the cash register area c. Whether the clerk has an unusually close relationship with one or more large vendors d. A second set of books
d
a key anti-fraud control in preventing/detecting deposit larceny and lapping is: a. placing surveillance cameras at each point of sale b. assigning unique ID numbers to cashiers c. prohibiting deposits from being made in night drops d. itemizing deposit slips
d
Although most cases in the ACFE's 2016 Report to the Nations on Occupational Fraud and Abuse involved a single perpetrator, when two or more persons conspired, the median loss was more than ____ times higher. A. Two b. Seven c. Nine d. Four
b
In order for a confession to be valid, it must be deemed to be: A. Voluntary b. Coerced c. Factual d. Sincere
a
While grand juries have great leeway related to issuing subpoenas, the Fourth Amendment requires reasonableness. To meet the reasonableness standard, the subpoena must be likely to generate evidence that is: A. Relevant to the issue under consideration, be particular and reasonably specific, and be limited to a reasonable time frame. b. Relevant to the issue under consideration, be particular and reasonably specific, and be limited to class B felony (or higher) investigations. c. Relevant to the issue under consideration, be particular and reasonably specific, and be based on a higher than average probability that a crime has been committed. d. Relevant to the issue under consideration, be particular and reasonably specific, and must meet the Daubert standard.
a
A key to preventing check forgeries is to maintain a strict stet of procedures for the handling of outgoing checks, which include safeguarding blank check stock, establishing rules for custody of checks that have a been prepared but not signed, and _______________________: A. Separating the duties of check preparation and check signing. b. Using a signature stamp or mechanical signer. c. Making checks payable to "Cash" d. Requiring check signers to reconcile the bank statement
a
A number of theories about why the vast majority of people do not commit crime have been set forth over time. Which of the following is NOT one of the reasons cited in the text? A. Social conditioning/parental upbringing b. Fear of punishment c. To act in a just and moral manner according to society's standards d. Desire for rewards
a
According to the ACFE's 2016 Report to the Nations on Occupational Fraud and Abuse, survey respondents were presented with a list of 17 common behavioral red flags associated with occupational fraud and asked to identify which, if any, of these warning signs had been displayed by the perpetrator before the fraud was detected. Rank the presence of the following four red flags in order of their prevalence from highest to lowest percentage of cases in which they were identified. A. Living beyond means, financial difficulties, past-employment related problems, excessive pressure from within organization b. Living beyond means, financial difficulties, wheeler-dealer attitude, unusually close association with vendor/customer c Living beyond means, financial difficulties, addiction problems, divorce/family problems d. Living beyond means, financial difficulties, social isolation, complained about inadequate pay
a
Antifraud professionals logically conclude that small organizations are particularly vulnerable to occupational fraud and abuse. The results from fraud surveys bear this out: losses in the smallest companies were comparable to or greater than those in organizations with the largest number of employees. It is suspected that this phenomenon exists for two reasons. A. Smaller businesses have fewer divisions of responsibility and there is a greater degree of trust where people know one another personally. b. Smaller businesses employ fewer highly trained business managers and employees are less supervised. c. Smaller businesses are more mission driven by nature and less inclined to formally orient new employees to their responsibilities. d. Smaller businesses employ more people with a wheeler-dealer mindset and don't solicit competitive bids as frequently.
a
As a result of the Sarbanes-Oxley Act (2002), which of the following became part of the business landscape? A. Assessment of internal controls, preservation of evidence, whistleblower protection and increased penalties for securities fraud b. Mandatory separation of duties, two-factor authentication for online transactions, and prohibition of fraudulent financial reporting c. Mandatory quarterly reporting of shell company beneficial ownership, mandatory criminal background checks on all publicly traded company officers and directors, and annual review of internal controls by the SEC d. Auditing firm competence certification, annual disclosure of conflicts of interest by the board of directors, prohibition of illegal gratuities and penalties for whistleblowers
a
Black's Law Dictionary defines a tort as: A. A private or civil wrong or injury, other than breach of contract, for which the law will provide a remedy in the form of an action for damages b. An unlawful conduct of business affairs with funds derived from illegal acts c. When two or more people intend to commit an illegal act and take some steps toward its implementation d. Non-compliance with agency, regulatory, and court requirements
a
Findings in the ACFE's 2016 Report to the Nations indicate that at least one warning sign had been displayed by the perpetrator before the fraud was detected in more than 91% of cases. In 57% of cases, two or more such red flags were seen. According to the study, the six most commonly observed behavioral red flags were: living beyond means, financial difficulties, unusually close association with a vendor or customer, a "wheeler-dealer" attitude, recent divorce or family problems, and ______________. A. Control issues or unwillingness to share duties b. Addiction problems c. Irritability, suspiciousness, or defensiveness d. Excessive pressure from within the organization
a
If a company generates $12,000,000 in annual sales and has an operating margin of 5%, how many additional dollars in sales would it need to generate to make up for fraud losses of $180,000? A. $3,600,000 b. $360,000 c. $180,000 d. $1,800,000
a
In Cressey's view, there were two components of perceived opportunity necessary to commit a trust violation: ____________________ and technical skill. A. General information b. Accounting know-how c. Observed gaps in internal controls d. Knowledge of financial fraud schemes
a
In addition to the fraud triangle, typical motivations of fraud perpetrators may be identified with the acronym M.I.C.E. This stands for money, ideology, _________, and ego/entitlement. A. Coercion b. Conversion c. Collusion d. Concealment
a
One reality of what is known as the criminal justice funnel is: A. Few cases result in convictions and incarcerations b. A majority of cases result in convictions and incarcerations c. Regulatory agencies play an important role in monitoring illegal activities d. Civil and criminal cases cannot be pursued simultaneously
a
Regarding criminal prosecutions of occupational fraud and their outcomes, although the percentage of cases referred to prosecution ____________ gradually from the ACFE's 2012 to the 2016 reports, the percentage of cases that prosecutors successfully pursued ___________. A. Decreased; increased b. Increased; decreased c. Decreased; decreased d. Increased; increased
a
The intentional, deliberate misstatement, or omission of material facts or accounting data that is misleading and, when considered with all the information made available, that would cause the reader to change or alter his or her judgment or decision is defined by the Association of Certified Fraud Examiners as: A. Financial statement fraud b. Financial statement misstatement c. Financial statement concealment d. Financial statement re-statement
a
The primary purpose of a civil action is to: A. Recover losses and possibly reap punitive damages b. Redress criminal wrongdoing through incarceration c. Reduce the case load in criminal courts d. Restore societal faith in the court system
a
The primary role of _________________________ is to protect investors, create long-term shareholder value, ensure investor confidence and support strong and efficient capital markets. A. Corporate governance b. Certified Fraud Examiners and CPAs c. The SEC, PCAOB and COSO ERM Framework d. Wall Street analysts
a
The three attributes of a fraud are: A. The scheme or fraud act, the concealment activity, and the conversion or benefit. b. The motive, rationalization and opportunity. c. The intent, the planning, and the execution of a fraudulent act. d. Asset misappropriations, corruption, and financial statement fraud and other fraudulent statements.
a
Under current auditing standards, the auditor is required to: A. Undertake a fraud-risk assessment but not for planning and performing auditing procedures to detect immaterial misstatements. b. Undertake a fraud-risk assessment to include planning and performing auditing procedures to detect immaterial misstatements. c. Undertake a fraud-risk assessment but not for planning and performing auditing procedures to detect immaterial misstatements unless such misstatements are caused by fraud (rather than error). d. Undertake a fraud-risk assessment to include planning and performing auditing procedures to detect immaterial misstatements whether caused by fraud or error.
a
Using non-financial data to corroborate financial information is: A. Powerful and its value cannot be overstated b. Amateurish and used primarily by inexperienced investigators c. Dangerous because it is usually misunderstood by juries d. Acceptable on an extremely limited basis
a
When considering antifraud measures within an organization, the axiom that "fraud deterrence begins in the employee's mind" most closely means that there has to be a _________________. A. Perception of detection b. Perception of punishment (if caught) c. Perception of fairness within all levels of the organization d. Perception of shared values within the organization
a
When using a hypotheses-evidence matrix to evaluate evidence in support of any particular hypothesis in a fraud case, it is crucial to understand that: A. We can never prove any hypothesis b. We can never disprove intent c. We shouldn't become distracted by the "direction" of evidence d. We shouldn't become distracted by evidence that seems to eliminate alternative hypotheses
a
Civil litigation issues such as damage claims, lost wages, disability, wrongful death, assets and business valuations, costs and lost profits associated with construction delays or business interruptions, insurance claims, intellectual property infringement, environmental issues, tax claims are examples of the kinds of issues for which: A. The RICO Act was adopted b. Forensic litigation advisory services are offered by forensic accountants c. The Sarbanes-Oxley Act was adopted d. SAS99 was adopted
b
Cressey identified six categories of non-shareable financial pressures that prompted embezzlers to act. These included violation of ascribed obligations, business reversals, physical isolation, status gaining, employer-employee relationships, and ______________. A. Financial greed b. Problems resulting from personal failure c. Depression or other mental health issues d. Amoral value system
b
Crowe expanded the fraud triangle into a pentagon by adding ______________ and ___________. A. Compensation equity and cultural norms b. Arrogance and competence c. Myers-Briggs Personality Types and educational attainment d. Internal control environment and organizational pressure
b
Generally, evidence is admissible in court if it is relevant, its probative value out- weighs any prejudicial effects, and: A. It is trustworthy, meaning that it is presented by credible witnesses. b. It is trustworthy, meaning that it is subject to examination and cross-examination. c. It is trustworthy, meaning that it is fact based rather than opinion. d. It is trustworthy, meaning that it is neutral in its impact on the jury.
b
In most occupational fraud cases, it is ___________ that there will be direct evidence of the crime. A. Likely b. Unlikely c. Certain d. Impossible
b
One of the best ways to prevent and detect shell company schemes is to maintain and regularly update a list of: A. Known shell companies in order to compare names of vendors with it. b. Approved vendors that should be verified by someone independent of the purchasing function. c. Offshore banks whose routing numbers can be compared to vendor bank accounts (using the endorsements on cashed checks). d. Purchases by employees that have no purchasing authority (because no one suspects them)
b
One of the best ways to ruin an investigation, fail to gain a conviction, or lose a civil case, is to: A. Take disparate pieces of financial and non-financial data to tell a story of who, what, when, where, how, and why b. Base investigative conclusions on logic and arguments that the defendant is a "bad person" c. Connect the dots in a case consistent with the investigator's interpretation of the evidence d. Excessively rely on evidence, especially when the plaintiff has a clear track record of ethical conduct or is an upstanding community leader
b
Prior to admissibility of evidence in court, the attorney must lay the foundation demonstrating relevance, materiality, and ____________ (reliability). A. Validity b. Competence C. Probative value D. Non-speculative
b
Professional skepticism can be broken into three attributes. Which one of the following is NOT one of those three attributes? A. A commitment to persuasive evidence b. A willingness to give others a presumption of goodwill until they prove otherwise c. A questioning mind and a critical assessment of the evidence d. A recognition that the plaintiff and/or the defendant may be masking the true underlying story
b
The Daubert standard is related to the admissibility of expert testimony (expert opin- ions). Under the Daubert standard, the trial judge makes an assessment of whether an ex- pert's scientific testimony is based on reasoning or methodology that is scientifically valid and can properly be applied to the facts at issue. Which of the following is NOT one of the considerations in determining whether the methodology is valid? A. Whether the theory or technique in question can be used and has been tested. b. Whether the theory or technique in question has been verified through a double-blind study that includes a control group. c. Whether the theory or technique has been subject to peer review and publication. d. Whether the theory or technique has attracted widespread acceptance within a rele-vant scientific community.
b
The Sarbanes-Oxley Act of 2002 authorized the SEC to issue implementation rules on many of its provisions intended to improve corporate governance financial reporting, and audit functions. Which of the following was NOT one of the rules summarized in the textbook? A. New standards of professional conduct for attorneys b. Certifications of legality by the owners of special purpose entities c. Disclosures regarding a Code of Ethics for Senior Financial Officers and Audit Committee Financial Experts d. Conditions for use of non-GAAP financial measures
b
The approach to investigating fraud recommended by the text: A. Identify the specific law that was violated b. Examine relevant evidence with an eye toward demonstrating three attributes of fraud c. Defer decisions that are suited to an attorney's expertise d. Provide reasonable evidence in support of any opinion of guilt
b
The best way for organizations to prevent fraudulent register disbursements is to always maintain ___________________________: a A policy permitting cashiers to have access to the register control key. b. Appropriate separation of duties. c. Hidden camera surveillance of all cash register areas. d. Cashier authority for reversing their own transactions (but no one else's).
b
The term white-collar crime was coined by _____________ in 1939, when he provided the following definition: crime in the upper, white-collar class, which is composed of respectable or at least respected, business and professional men. A. Steve Albrecht b. Edwin H. Sutherland c. Joseph T. Wells d. Donald R. Cressey
b
While Dr. Steve Albrecht's research findings on fraud perpetrator characteristics were very similar to the non-shareable problems and rationalizations identified by Cressey, Albrecht introduced the ____________________ into the actions of the fraudsters. A. The role of compensation b. The role of the organization c. The role of social isolation d. The role of (an unfair) performance evaluation system
b
Regarding interviews conducted by a nonpublic entity and the Sixth Amendment, an employee: A. Does not have a right to consult a lawyer prior to an interview but has a right to have one present during one b. Does not have a right to have a lawyer present during an interview but has a right to consult one prior C. Does not have a right to have a lawyer present or to consult one prior to the inter- view d. Has a right to have a lawyer present during an interview and to consult one prior
c
You are testifying in a criminal trial where the CFO of a publicly traded company is accused of embezzling $2.7 million. Which of the following would be considered facts at issue? A. A Panama Papers leak showing the existence of an offshore shell company account with the CFO listed as the beneficial owner. b. Whether or not the CFO stole the money. c. An email from the CFO directing the Head of Accounting to disregard the absence of invoices for purchases of "business consulting services" authorized by the CFO. d. Documentation of special purpose entities created and controlled by the CFO that do not appear on the company's balance sheet.
b
_______________ is the totality of circumstances that lead a reasonable, professionally trained, and prudent individual to believe that a fraud has occurred, is occurring, and/or will occur. All fraud examinations must be based on it. A. Postulation b. Predication c. Proposition d. Premise
b
A common complaint among those who investigate fraud is that organizations and law enforcement ___________________________________________. A. Fail to understand the many ways in which fraud and other white-collar fraud can be perpetrated b. Do not keep pace with the growing sophistication of fraud and other white-collar offenses C. Do not do enough to punish fraud and other white-collar offenses d. Are overwhelmed with other concerns to the extent that fraud and other white-collar offenses are regarded as inconsequential in the grand scheme of things.
c
According to the ACFE's 2016 Report to the Nations on Occupational Fraud and Abuse, median fraud losses are the highest in cases of: A. Asset misappropriation b. Corruption c. Financial reporting fraud d. Insider trading
c
According to the AICPA, the "Achilles Heel" of an organization's antifraud efforts is _______________ and ___________________. A. An amoral corporate culture; an arrogant CEO b. Missing internal controls; lack of management review c. Collusion; management override d. A weak board of directors; an arrogant CEO
c
During the course of an investigation, you will encounter "loose threads" or "red flags" such as accounting anomalies. When encountering such anomalies, the fraud professional should: A. Evaluate any personal biases that cause you to suspect fraud b. Assume that it probably indicates dishonest conduct by someone in the organization c. Pull on it and see what happens d. Recognize that its mere existence is very likely proof of fraud
c
Even relevant evidence may be excluded from judicial proceedings if it is prejudicial, confusing, or ____________. A. Contradictory b. Material c. Misleading d. Inconclusive
c
Evidence is anything legally presented at trial to ___________ and convince a jury. A. Link the facts at issue into a story b. Explain or demonstrate the facts (such as a PowerPoint presentation) c. Prove a contention d. Secure a guilty verdict
c
Findings in the ACFE's 2016 Report to the Nations suggest that organizations that lacked _______________ were more susceptible to asset misappropriation schemes. A. Employee perception of detection b. A proper tone at the top c. Internal controls d. A reporting mechanism
c
Forensic accounting and fraud examination require at least three major skill types: A. Inquisitive, persuasive, and authoritative b. Equanimity, objectivity, and a commitment to excellence c. Technical competence, investigative, and communication d. Specialization in law or accounting, experience, and ongoing professional development
c
Forensic and Valuation Services (FVS) professionals can expect that: A. Their opinion will be carefully noted in court. b. The attorney for opposing counsel to defer to the FVS professional's expert opinion on matters pertaining to forensic accounting. c. Their work will be carefully scrutinized by the opposing side and that engagements are adversarial in nature. d. Mediation, arbitration, and negotiations are directed by FVS professionals.
c
Fraud deterrence begins _______________. A. In the existence of sound internal controls b. In the organizational mission and values c. In the employee's mind d. In the beliefs of the culture at large
c
Fraud examination is the ________ of resolving allegations of fraud from tips, complaints, or accounting clues. a. Tradecraft b. Art and science c. Discipline d. Accounting technique
c
Link charts, flow charts, commodity and money flow diagrams, timelines are: A. Popular in the movies, but rarely used in the real world of fraud investigation b. Useful during the hypothesis stage of an investigation but generally not beyond it c. Important as both investigative tools and communication tools d. Generally make complicated material less understandable because they leave too much room for speculation and interpretation compared to actual data
c
Money laundering, mail and wire fraud, criminal conspiracy and racketeering are examples of crimes associated with: A. The fraud triangle b. A private or civil wrong or injury, other than breach of contract, for which the law will provide a remedy in the form of an action for damages c. Organized crime d. Occupational fraud and abuse
c
One of the interesting aspects of the characteristics of fraud perpetrators is that they do not typically have ______________. A. Respect within their community b. Much knowledge of accounting standards c. A criminal background d. A college degree
c
Professional skepticism entails three overlapping concepts: An attitude that includes a questioning mind and a critical assessment of audit evidence, conducting of the engage- ment that recognizes the possibility of material misstatement due to fraud, and ____________________ with less-than-persuasive evidence. A. Tentative acceptance b. Professional tolerance c. Dissatisfaction d. Discarding documents
c
Surveillance is generally legal, however, once the investigator enters the realm of electronic (audio) surveillance, the laws become more complicated. Generally federal law prevents ________________________: A. The interception and/or recording of wire, oral, or electronic communications ex- cept if it is collected by a certified fraud examiner (CFE) as part of a legitimate in- vestigation. b. The interception and/or recording of wire, oral, or electronic communications ex- cept if it is recorded in a public venue. c. The interception and/or recording of wire, oral, or electronic communications ex- cept by law enforcement officers with a warrant. d. The interception and/or recording of wire, oral, or electronic communications ex- cept if it is evidence of a class B or higher felony investigation.
c
The "felonious stealing, taking and carrying, leading, riding, or driving away with another's property, with the intent to convert it or deprive the owner thereof" is the legal definition of: a. Embezzlement b. Tort c. Larceny d. Fraud
c
The best evidence rule allows copies of documents to be presented at trial un- der: A. No circumstance whatsoever b. The rules of admissibility c. Certain circumstances d. Oath that the copy has been altered
c
The occupational fraud and abuse classification system (fraud tree) arranges organizational frauds in which three categories? a. The act, concealment, and conversion b. Existence of a fiduciary relationship, breach of duty, harm to the plaintiff or benefit to the fiduciary c. Asset misappropriation, corruption, and financial statement fraud d. Incentive, opportunity, and rationalization.
c
There are five principal methods use to commit check tampering. Which of the following is NOT one of the five? A. Forged maker schemes b. Forged endorsement schemes c. Shell company schemes. d. Authorized maker schemes.
c
There are four methods by which employees typically abuse the expense reimbursement process. Which of the following is NOT one of these? A. Mischaracterized expense reimbursements b. Multiple reimbursements c. Extravagant expense reimbursements (e.g., flying first class instead of coach) d. Overstated expense reimbursement
c
There are two methods that perpetrators who commit fraudulent register disbursements impede detection. These are: a. Model employee and rarely takes vacations. b. Steal inventory equal to the disbursement and adjusting the perpetual inventory records. c. Small disbursements and destruction of records. d. Post a credit to perpetual inventory records and take part in the physical count.
c
To prove fraud, the investigator has to deal with the issue of: A. Professional skepticism b. Prior bad acts c. Intent d. Specific laws that were broken
c
Which three antifraud measures are associated with the largest reduction in median losses (though not among the most commonly implemented antifraud controls)? a. Proactive data monitoring/analysis, management review, surprise audits b. Proactive data monitoring/analysis, management review, fraud training for employees c. Proactive data monitoring/analysis, management review, hotline d. Proactive data monitoring/analysis, management review, code of conduct
c
four common elements to occupational fraud and abuse schemes are first identified by ACFE in its 1996 Report to the Nation on Occupational Fraud and Abuse. Which of the following does not contain all four elements? a. the activity is clandestine, violates the employee's fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, may or may not result in costs to the employing organization's assets, revenues, or reserves b. the activity is clandestine, violates the employee's fiduciary duties to the organization, is committed for the purpose of direct ro indirect financial benefit to the employee, and is a violation of state and/or federal law c. the activity is clandestine, violates the employee's fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, and costs the employing organization assets, revenues, or reserves d. the activity is clandestine, violates the employee's non-fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, and costs the employing organization assets, revenues, or reserves
c
A search warrant has several advantages over a subpoena. Which of the following is NOT one of the advantages described in the text? A. A warrant allows the holder of the warrant, not the target of the defense counsel, to decide which documents are relevant and must be produced. b. A warrant avoids, but does not eliminate, the possibility of the destruction of evi- dence. c. A warrant gives the investigator the ability to interview key witnesses while the search is being conducted. d. A warrant gives the investigator the ability to seize any unlawful item that may be discovered in the search if it is part of a class B (or higher) felony.
d
A subcategory of shell company schemes in which actual goods or services are sold to the victim company are known as pass through-schemes because: A. The perpetrator has to devise a way to add value to actual goods and services before they pass through to the victim company. b. The perpetrator has to pass through customs to place stolen funds in offshore bank accounts. c. The perpetrator has to pass through several layers of internal controls to make the fraud work. d. The perpetrator purchases actual goods and services which simply pass through a shell company to the victim company at inflated prices
d
An unauthorized assumption and exercise of the right of ownership over goods or personal chattels belonging to another, to the alteration of their condition or the exclusion of the owner's rights is the definition of: A. Collusion b. Concealment c. Capital misappropriation d. Conversion
d
Demonstrative evidence may include photographs, charts, diagrams, drawings, scale models, but because it is not real evidence it must not ___________ and it must not mate- rially alter any significant aspect of the facts at issue. A. Have been outside the chain of custody b. Be speculative or conjectural c. Raise doubts in the mind of the jury d. Create prejudice
d
Documentary evidence is at the heart of most fraud and forensic accounting investi- gations. Five considerations must be given to any piece of documentary evidence: The document must not have been forged, original documents are preferred, the document must not be hearsay or objectionable, the document needs to be authenticated, and the document must be _____________. A. Illustrative (or summative) b. Probative in value c. Unbiased d. Reliable
d
Donald R. Cressey (1919-1987) used his doctoral dissertation to study embezzlers, whom he called "trust violators." Upon completion of his research, he developed what still remains as the classical model for the occupational offender. In 1991, Dr. Steve Albrecht organized Cressey's three conditions into a tool that has become known as the "fraud triangle." Which answer below constitutes the three legs of the fraud triangle? A. Perceived opportunity, perceived motive, and intellectualization B. Perceived pressure, perceived isolation, and rationalization C. Perceived motive, perceived opportunity, and minimization d. Perceived pressure, perceived opportunity, and rationalization
d
Edwin H. Sutherland (1883-1850), a criminologist, coined the term white-collar crime in 1939 and later developed the theory of _____________________ whose basic tenet is that crime is learned. A. Constructivist association b. Fraud triangle association c. Attributional association d. Differential association
d
In a 2004 CPA Journal article, Wolfe and Hermanson argue that the fraud triangle could be enhanced to improve both fraud prevention and detection by considering a fourth element, ________________. A. Internal control environment B. Myers-Briggs Personality Types C. The role of arrogance d. Individual capability
d
In contrast to the fraud triangle which US courts have deemed to be more of a theoretical concept rather than a set of measurable standards or a specific, practical methodology for arguing that fraud occurred, the triangle of fraud action can be used in developing prosecutorial evidence. In particular, the element of ________________ provides a compelling argument that the act was intentional. A. The Act b. Conversion c. Opportunity d. Concealment
d
In the contexts of searches, the expression "fruit from the forbidden tree" means: A. Any information derived from confidential informants cannot be introduced if the CI has a felony record. b. Any information from evidence that was in "plain view" of law enforcement cannot be introduced. c. Any information derived from voluntary consent to search cannot be introduced. d. Any information derived from illegal evidence cannot be introduced
d
In the fraud perpetrator profile presented in the text, which set of characteristics summarizes the typical fraud perpetrator? A. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well educated, accountant, upper management, or executive, generally acts in collusion with others b. Male, middle-aged to retired, with the company for five or more years, previously charged or convicted of a criminal offense, well educated, accountant, upper management, or executive, acts in alone c. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well educated, line employee or lower management, or executive, acts in collusion with others d. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well education, accountant, upper management, or executive, acts alone
d
One goal of the ACFE survey was to try to determine why organizations frequently decline to take legal action against fraudsters. In cases where no legal action was taken, the survey provided respondents with a list of commonly cited explanations and asked them to mark any that applied to their case. Which of the following was NOT one of the explanations cited by the survey's participants? a. Fear of bad publicity b. Internal discipline sufficient c. Lack of evidence d. Credibility compromise
d
Organizational crime occurs when companies, corporations, not-for-profits, government bodies, and otherwise legitimate and law-abiding organizations are: A. involved in unethical conduct b. involved in organized crime c. involved in a civil offense d. involved in a criminal offense
d
The essential characteristics of financial statement fraud are: a. The misstatement is material and intentional and the users of the financial statements are investors in publicly traded companies. b. This misstatement is material and intentional and the preparers of the financial statements have a fiduciary obligation to the organization. c. The misstatement is material and intentional and the preparers of the financial statements fail to report the misstatement to the SEC or other applicable authority. d. The misstatement is material and intentional and the users of the financial statements have been misled.
d
The interrelationship among auditing, fraud examination, and forensic accounting is dynamic and changes over time because of: a. the Internet and other technological advances b. high profile fraud cases such as Enron, Tyco, and WorldCom c. emerging research by the ACFE which casts doubts on previously existing theories of criminality d. political, social, and cultural pressures
d
The term occupational fraud and abuse is defined as: a. The use of one's occupation for status enrichment through misuse or misapplication of the employing organization's resources or assets. b. The use of one's occupation for personal enrichment through the unintentional misuse or misapplication of the employing organization's resources or assets. c. The use of one's occupation for personal enrichment through the deliberate misuse or misapplication of a different organization's resources or assets. d. The use of one's occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization's resources or assets
d
To prevent fraudulent shipments of merchandise, organizations should make sure that every ___________ is matched to an approved _________ before the merchandise goes out. a. Transaction; system b. Warehouse worker; supervisor of shift leader c. Sales record; order form D. Packing slip; purchase order
d
To prevent larceny of noncash assets, the duties of requisitioning, purchasing, and ___________ the assets should be segregated. A. Inventorying B. Classifying C. Tagging D. Receiving
d
When it comes to fraud loss amounts in organizations, the data shows that there is a direct correlation between ________ loss and ________. A. Average; perpetrator's intelligence b. Average; perpetrator's position c. Median; perpetrator's intelligence d. Median; perpetrator's position
d
Which of the following is NOT one of the four essential elements of fraud under common law? a. A material false statement b. Reliance on the false statement by the victim c. Knowledge that the statement was false when it was spoken d. Use of email, wire, or telephone with a criminal intent to deceive
d
Which of the following is NOT typical of forensic and litigation advisory services? a. Cost and lost profits associated with construction delays. b. Divorce and matrimonial issues. c. Environmental issues. d. Stating an expert opinion about the guilt or innocence of a plaintiff or defendant in a court of law.
d